Purdue University proudly presents. Aaron Jarvis, Network Engineer.
|
|
- Darleen Bryan
- 8 years ago
- Views:
Transcription
1 Purdue University proudly presents Aaron Jarvis, Network Engineer
2 Any devices or software shown during this presentation are for demonstration purposes only. Purdue University does not endorse or support any devices or software being used in this presentation.
3 Cellular Security Bluetooth Security Flash Drive Security VoIP Security
4 Cellular Security Bluetooth Security Flash Drive Security VoIP Security
5 Global Statistics from Gartner Estimated 2.6 Billion cell phones in circulation by 2009 Smart phones will represent 1/5 th of all phone sales in 2008 Voice, data, video
6 Cellular Networks Analog GSM AT&T/Cingular, T-Mobile CDMA Verizon, Sprint iden Nextel
7 Cellular Networks Analog Analog Mobile Phone System(AMPS) Deployed in 1980 s Still in use today! Transmit/Receive without encryption Easily eavesdropped by using a scanner
8 Cellular Networks GSM Global System for Mobile Communications Widespread use SIM Stores private information allowing user to switch phones and take information with them Encrypted voice from mobile device to cellular network
9 Cellular Networks CDMA Code Division Multiple Access Originally developed by US Navy Encrypted voice from mobile device to cellular network No SIM card Some carriers providing service that transfers private information between phones
10 Cellular Networks iden Integrated Digital Enhanced Network Developed by Motorola Push to talk
11 Risks with Cell Phones Loss Eavesdropping Location Financial
12 Risks with Cell Phones Loss Physical Address book, account numbers, passwords Treat your cell phone like it was a laptop Lock or password protect if possible Disable bluetooth when not in use
13 Risks with Cell Phones Eavesdropping Voice Can be intercepted with right equipment Talking loud Data Bluetooth More in next section
14 Risks with Cell Phones Location Many phones with integrated GPS receivers Could be used for tracking
15 Risks with Cell Phones Financial Report a lost or stolen phone immediately May be liable for calls made if not reported in a timely fashion Roaming International Many countries > $1.00 min Domestic Automatic, can cost $$$ Less and less a problem due to greater coverage and agreements through providers
16 Upgrading or Replacing Cell Phones Before discarding, recycling, etc Perform a factory reset on the device Erases all private information on the phone
17 Cellular Security Bluetooth Security Flash Drive Security VoIP Security
18 What is bluetooth? Wireless technology used to allow communication between electronic devices(phones, cars, keyboards, mice) Typically around 30 feet range Creates a personal area network
19 How does bluetooth work? Uses 2.4Ghz Shared with Wifi, cordless phones,microwaves Low power transmitters Pairing between devices Agree to communicate with each other
20 Versions of Bluetooth 1.0/1.0B Introduced in 1998 Not used much as device interoperability was not very good in this version 1.1 First widely used version Greater interoperability
21 Versions of Bluetooth 1.2 Backwards compatible with version 1.1 Adaptable frequency hopping 1Mbps data rate Improved audio through retransmission
22 Versions of Bluetooth EDR Backwards compatible with previous versions 3Mbps data rate Lower power consumption Improved multi-link connectivity Pairing to more than one device at a time
23 According to the Bluetooth Special Interest Group(SIG) In order to break into a bluetooth device the following must take place Force two paired bluetooth devices to break their connection Steal/Capture the packets used to resend the PIN Decrypt the PIN
24 Bluetooth Sniffing Equipment Some commercially made equipment available but very expensive Bluesniper rifle - Homemade ~$300 Range ~ 1 mile
25 Bluetooth Security Threats Bluejacking Allows users to send business cards anonymously Does not allow data access to your phone Eliminate threat by Making sure device is in non-discoverable mode
26 Bluetooth Security Threats Bluesnarfing Allows access to data on phone Make phone calls Send/Receive text messages Requires advanced equipment and knowledge Must be within 30ft range Eliminate threat by Making sure device is in non-discoverable mode Still vulnerable, but much harder to exploit Upgrade phone or obtain patched software
27 Bluetooth Security Threats Bluebugging Allows access to data on phone Make phone calls Send/Receive text messages Requires advanced equipment and knowledge Must be within 30ft range Eliminate threat by Making sure device is in non-discoverable mode Still vulnerable, but much harder to exploit Upgrade phone or obtain patched software
28 Bluetooth Best Practices Disable when not in use Use a PIN greater than 8 digits Put device in non-discoverable mode Update to newest software if using older phone to patch vulnerabilities
29 Cellular Security Bluetooth Security Flash Drive Security VoIP Security
30
31
32 Risks with Flash Drives Physical Loss If data is unencrypted then person has free access to content Malware Reported instances of digital picture frames with malware preloaded Use a virus scanner on new devices to ensure its safe to use
33 Methods to Secure Data on Flash Drives Encryption Software Truecrypt FreeOTFE Hardware Ironkey After 10 invalid attempt device issues a self destruct sequence and all data and encryption keys are erased Biometrics Fingerprint
34 Cellular Security Bluetooth Security Flash Drive Security VoIP Security
35 What is VoIP? Voice-over IP Make voice calls to PSTN or other users Commonly uses Internet to reach service provider Phone adapters allow for service similar to traditional analog phone service Softphones allow for service to be used from a computer
36 Enterprise vs. Personal Solutions Features More than just dial tone Security Signaling and Media Encryption Quality of Service Ensure voice packets are treated as higher priority than data
37 Live Demo Capturing a Phone Call made via Vonage USB Phone
38 Cellular Security Bluetooth Security Flash Drive Security VoIP Security
39 Questions or Comments?
Emerging Wireless Technologies
Emerging Wireless Technologies QCHAT The Future of Push-to-Talk Communications Foreword: The Public Safety Wireless Network (PSWN) Program is conducting an ongoing assessment of advancements in the wireless
More informationWireless (Select Models Only) User Guide
Wireless (Select Models Only) User Guide Copyright 2007, 2008 Hewlett-Packard Development Company, L.P. Windows is a U.S. registered trademark of Microsoft Corporation. Bluetooth is a trademark owned by
More informationWireless Broadband Access
Wireless Broadband Access (Brought to you by RMRoberts.com) Mobile wireless broadband is a term used to describe wireless connections based on mobile phone technology. Broadband is an electronics term
More informationWireless (Select Models Only) User Guide
Wireless (Select Models Only) User Guide Copyright 2008 Hewlett-Packard Development Company, L.P. Windows is a U.S. registered trademark of Microsoft Corporation. Bluetooth is a trademark owned by its
More informationBluetooth: Understanding the Technology, Its Vulnerabilities, and Security Recommendations
Bluetooth: Understanding the Technology, Its Vulnerabilities, and Security Recommendations 19 March 2015 Key Points Continuous development of Bluetooth technology is rapidly increasing the use of Bluetoothenabled
More informationChapter 3 Cellular Networks. Wireless Network and Mobile Computing Professor: Dr. Patrick D. Cerna
Chapter 3 Cellular Networks Wireless Network and Mobile Computing Professor: Dr. Patrick D. Cerna Objectives! Understand Cellular Phone Technology! Know the evolution of evolution network! Distinguish
More informationSecurity Requirements for Wireless Networking
Security Requirements for Wireless Networking Developed by Copyright 2007 Rysavy Research TABLE OF CONTENTS INTRODUCTION... 2 SECURITY REQUIREMENTS... 2 WIRELESS OPERATOR SECURITY LIMITATIONS... 3 END
More informationRunning Head: AWARENESS OF BYOD SECURITY CONCERNS 1. Awareness of BYOD Security Concerns. Benjamin Tillett-Wakeley. East Carolina University
Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1 Awareness of BYOD Security Concerns Benjamin Tillett-Wakeley East Carolina University AWARENESS OF BYOD SECURITY CONCERNS 2 Abstract This paper will
More informationWireless Mobile speaker
Wireless Mobile speaker lowdi.com 1 2 3 1 2 3 4 On/Off switch Micro USB charging port Audio input Main control button Side Front 4 5 6 5 6 Volume controls LED status light Make sure that Lowdi is fully
More informationHow To Use A Femtocell (Hbn) On A Cell Phone (Hbt) On An Ipad Or Ipad (Hnt) On Your Cell Phone On A Sim Card (For Kids) On The Ipad/Iph
. Femtocell: Femtostep to the Holy Grail... Ravishankar Borgaonkar, Kévin Redon.. Technische Universität Berlin, SecT ravii/kredon@sec.t-labs.tu-berlin.de TROOPERS 2011, 30 March 2011 3G/UMTS femtocells
More informationLogitech Advanced 2.4 GHz Technology
Logitech Advanced 2.4 GHz Technology Revision 1.1H March 2, 2009 TABLE OF CONTENTS 1 INTRODUCTION... 3 2 SYSTEM OVERVIEW... 4 2.1 NETWORK TOPOLOGY...4 2.2 MAIN FEATURES...4 3 ASSOCIATION MODEL... 5 4 ENCRYPTION...
More informationMobility and cellular networks
Mobility and cellular s Wireless WANs Cellular radio and PCS s Wireless data s Satellite links and s Mobility, etc.- 2 Cellular s First generation: initially debuted in Japan in 1979, analog transmission
More informationShoreTel Mobility Version 4.6 Platform Support Guide. Rev. 1
ShoreTel Mobility Version 4.6 Platform Support Guide Rev. 1 Document and Software Copyrights Copyright 1998-2011 by ShoreTel Inc., Sunnyvale, California, USA. All rights reserved. Printed in the United
More informationVoIP - POTS - Mobile. Phone Service Choices. http://mlcug.org/ May 2012 1
VoIP - POTS - Mobile Phone Service Choices http://mlcug.org/ May 2012 1 Basic service choices VoIP - Voice over IP o Uses the Internet as your phone line o WiFi (radio) or Ethernet connected phones POTS
More informationCase Study: Smart Phone Deleted Data Recovery
Case Study: Smart Phone Deleted Data Recovery Company profile McCann Investigations is a full service private investigations firm providing complete case solutions by employing cutting-edge computer forensics
More informationODOT Surveyor s Conference
Introduction to This document describes the process that will enable you to access the ODOT servers and Microsoft Outlook (E-mail) when you are away from your office and not on the internet. The process
More informationUser Guide. BlackBerry Storm 9530 Smartphone. Version: 4.7
BlackBerry Storm 9530 Smartphone Version: 4.7 SWD-490426-0909090640-001 Contents Shortcuts... 9 BlackBerry basics shortcuts... 9 Phone shortcuts... 9 Camera shortcuts... 9 Media shortcuts... 9 Typing shortcuts...
More informationWireless LANs vs. Wireless WANs
White Paper Wireless LANs vs. Wireless WANs White Paper 2130273 Revision 1.0 Date 2002 November 18 Subject Supported Products Comparing Wireless LANs and Wireless WANs Wireless data cards and modules,
More informationCyber Security Best Practices
Cyber Security Best Practices 1. Set strong passwords; Do not share them with anyone: They should contain at least three of the five following character classes: o Lower case letters o Upper case letters
More informationBy: Jen DosSantos, Kerry Cassidy & Mike Dunn
By: Jen DosSantos, Kerry Cassidy & Mike Dunn VoIP is an acronym for Voice over Internet Protocol. VoIP describes any kind of connection uses the internet to make phone calls. VoIP calls can be made from
More informationVolume 12 Issue 4 Version 1.0 Fabruary 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc.
Volume 12 Issue 4 Version 1.0 Fabruary 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN: & Print ISSN: Voice Calls between Wireless
More informationcommunication over wireless link handling mobile user who changes point of attachment to network
Wireless Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets: laptops, palmtops, PDAs, Internet-enabled phone promise anytime untethered Internet
More informationCOMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING INFORMATION TECHNOLOGY STANDARD Name Of Standard: Mobile Device Standard Domain: Security Date Issued: 09/07/2012 Date Revised:
More informationLogitech Advanced 2.4 GHz Technology With Unifying Technology
Logitech Advanced 2.4 GHz Technology Revision 070709 July 7, 2009 TABLE OF CONTENTS 1 INTRODUCTION: THE MOVE TO WIRELESS PERIPHERALS IN BUSINESS...3 2 SYSTEM OVERVIEW...4 2.1 NETWORK TOPOLOGY...4 2.2 MAIN
More informationWireless Network Standard and Guidelines
Wireless Network Standard and Guidelines Purpose The standard and guidelines listed in this document will ensure the uniformity of wireless network access points and provide guidance for monitoring, maintaining
More informationGSM Risks and Countermeasures
GSM Risks and Countermeasures STI Group Discussion and Written Project Authors: Advisor: Johannes Ullrich Accepted: February 1, 2010 Abstract Recent research has shown that GSM encryption can be cracked
More informationCase Study: Mobile Device Forensics in Texting and Driving Cases
Case Study: Mobile Device Forensics in Texting and Driving Cases Company Profile McCann Investigations is a full service private investigation firm providing complete case solutions by employing cutting-edge
More informationHow To Understand The History Of The United States
WIRELESS GLOSSARY OF TERMS Air Interface: The operating system of a wireless network. Technologies include AMPS, TDMA, CDMA, GSM and iden. AMPS: Advanced Mobile Phone Service (AMPS) is the original analog
More informationL-3 Guardian SME PED Frequently Asked Questions
1. What is L-3 Guardian and why do I want one? L-3 Guardian was developed under the NSA Secure Mobile Environment Personal Electronic Device (SME PED) Program. L-3 Guardian is a wireless handheld PDA which
More informationChapters 1-21 Introduction to Wireless Communication Systems
Chapters 1-21 Introduction to Wireless Communication Systems Yimin Zhang, Ph.D. Department of Electrical & Computer Engineering Villanova University http://yiminzhang.com/ece8708 Yimin Zhang, Villanova
More informationTrust Digital Best Practices
> ARMING IT AGAINST SMARTPHONE THREATS Trust Digital Best Practices April 2009 The information contained herein is subject to change at any time, and Trust Digital makes no warranties, either express or
More informationOptimizing Wireless Networks.
from the makers of inssider Optimizing Wireless Networks. Over the past few years, MetaGeek has created tools to help users optimize their wireless networks. MetaGeek s tools help visualize the physical
More informationTHE SUNSET OF. A KORE White Paper Better Coverage, Choice & Reliability
THE SUNSET OF 2G A KORE White Paper Better Coverage, Choice & Reliability The dawn of 4G LTE connectivity brings with it new possibilities for connectivity and mobile devices. But as the introduction of
More informationUnified messaging is provided to over 1,000 users today and continues to increase along with campus growth.
IV. Voice Services Current Outlook Voice services on campus and at several off-campus sites are provided by an Aastra MD110 PBX. There are approximately 17,200 campus lines and 1,000 trunk lines. The telephone
More information1. What is the main difference between the X3 micro and other Bluetooth headsets? 3. How does the X3 micro use the Bluetooth technology?
X3 Micro FAQ X3 Micro General 1. What is the main difference between the X3 micro and other Bluetooth headsets? 2. What is included in the X3 micro package? 3. How does the X3 micro use the Bluetooth technology?
More informationAbout Sectra Communications
Panthon About Sectra Communications We provide secure communication solutions for European government authorities, defence departments and other critical functions of society. We have a solid core expertise
More information802.11b and associated network security risks for the home user
802.11b and associated network security risks for the home user by Michael Osten mosten@bleepyou.com Background ================= Approved in 1997 by the IEEE 802 committee, 802.11 details the framework
More informationReview of Cell Phone Technology
Review of Cell Phone Technology Types of Cell Technology - CDMA - GSM - iden - TDMA CDMA Code Division Multiple Access (CDMA) CDMA Code Division Multiple Access. In reality it is cdmaone (2G) or CDMA2000
More informationWorkTime UC Mobile Admin Guide
WorkTime UC Mobile Admin Guide Release: 20.1.1 Android 20.1.2 ios Document Version 1.0 Table of Contents 1 About XO Hosted PBX UC Mobile Client...1 2 Use Cases...2 2.1 Placing Outbound Calls... 2 2.2 Receiving
More informationOver the PSTN... 2 Over Wireless Networks... 2. Network Architecture... 3
Content Introduction... 1 History of Modems... 2 Over the PSTN... 2 Over Wireless Networks... 2 Network Architecture... 3 Circuit-Switched Cellular Data... 3 Short Message Service... 3 Packet-Switched
More informationCloud Voice A new and simpler way to deliver your voice communications
Cloud Voice A new and simpler way to deliver your voice communications The solution in a nut shell Mogul Wave offers a SIP solution based on: SIP phones (hard/soft phones) SIP accounts - Mogul Wave s on-net
More informationWhite Paper. D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. E-mail: info@dlink.com.sg; Web: http://www.dlink-intl.
Introduction to Voice over Wireless LAN (VoWLAN) White Paper D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. Introduction Voice over Wireless LAN (VoWLAN) is a technology involving the use
More informationGuide to Wireless Communications. Digital Cellular Telephony. Learning Objectives. Digital Cellular Telephony. Chapter 8
Guide to Wireless Communications Digital Cellular Telephony Chapter 2 Learning Objectives Digital Cellular Telephony 3 Describe the applications that can be used on a digital cellular telephone Explain
More informationWireless Network Policy
Wireless Network Policy Purpose Guide the deployment and integrity of wireless networking on the Kettering University campus to ensure reliable, compatible, and secure operation Protect the security of
More informationWireless Threats To Corporate Security A Presentation for ISACA UK Northern Chapter
Wireless Threats To Corporate Security A Presentation for ISACA UK Northern Chapter Introduction Who are we? Matt Moore, Senior Consultant @ PenTest Ltd. Mark Rowe, Technical Director @ PenTest Ltd. What
More informationMobile Office Security Requirements for the Mobile Office
Mobile Office Security Requirements for the Mobile Office S.Rupp@alcatel.de Alcatel SEL AG 20./21.06.2001 Overview Security Concepts in Mobile Networks Applications in Mobile Networks Mobile Terminal used
More informationCOMPUTERS ARE YOUR FUTURE CHAPTER 8 WIRED & WIRELESS COMMUNICATION
COMPUTERS ARE YOUR FUTURE CHAPTER 8 WIRED & WIRELESS COMMUNICATION Answers to End-of-Chapter Questions Matching g 1. whiteboard i 2. sending device o 3. streaming j 4. WiFi m 5. Webcam d 6. data transfer
More informationTelecommunications and the Information Age ET108B. Cell Phone Network
Telecommunications and the Information Age ET108B Cell Phone Network The Cellular Telephone Network Cellular Telephone Features Carrying Data Across the Cellular Network Satellite Telephone Service Cellular
More informationCHAPTER 1 1 INTRODUCTION
CHAPTER 1 1 INTRODUCTION 1.1 Wireless Networks Background 1.1.1 Evolution of Wireless Networks Figure 1.1 shows a general view of the evolution of wireless networks. It is well known that the first successful
More informationWireless Local Area Network
Wireless Local Area Network ดร. อน นต ผลเพ ม Anan Phonphoem, Ph.D. anan@cpe.ku.ac.th http://www.cpe.ku.ac.th/~anan Computer Engineering Department Kasetsart University, Bangkok, Thailand iwing Lab CPE
More informationMaXphone Multi-Access Extension for Smartphones
MaXphone Multi-Access Extension for Smartphones PSCR Public Safety Broadband Stakeholder Conference 2014 Per Johansson pjohansson@maxentric.com DHS Wireless Broadband Technology Demonstrator BAA DHS 12-10
More informationCellebrite UFED Physical Pro Cell Phone Extraction Guide
Cellebrite UFED Physical Pro Cell Phone Extraction Guide By Colby Lahaie Patrick Leahy Center for Digital Investigation Champlain College May 16, 2012 Table of Contents 1 Introduction... 2 1.1 Research
More informationIndian Journal of Advances in Computer & Information Engineering Volume.1 Number.1 January-June 2013, pp.1-5 @ Academic Research Journals.
Cellular System Rajat Chugh, Parag Jasoria, Tushar Arora, Nitin Ginotra and Vivek Anand V Semester, Department of Computer Science and Engineering, Dronacharya College of Engineering, Khentawas, Farukhnagar,
More informationPolicy and Profile Reference Guide
BlackBerry Enterprise Service 10 BlackBerry Device Service Version: 10.2 Policy and Profile Reference Guide Published: 2014-06-16 SWD-20140616165002982 Contents 1 About this guide... 10 2 New IT policy
More informationModule 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur
Module 5 Broadcast Communication Networks Lesson 9 Cellular Telephone Networks Specific Instructional Objectives At the end of this lesson, the student will be able to: Explain the operation of Cellular
More informationKISUMU LAW COURTS: SPECIFICATIONS FOR A UNIFIED COMMUNICATION SYSTEM / VOICE OVER INTERNET PROTOCOL (VOIP) SOLUTION. Page 54 of 60
SPECIFICATIONS FOR A UNIFIED COMMUNICATION SYSTEM / VOICE OVER INTERNET PROTOCOL (VOIP) SOLUTION Page 54 of 60 UNIFIED COMMUNICATION SYSTEM (VOIP) PROPOSAL FOR KISUMU JUDICIARY COURTS. 1.0 PARTICULARS
More informationUser Guide. Memo S580. www.poshmobile.com
User Guide Memo S580 www.poshmobile.com Welcome to POSH S580 Memo Quick Guide S580 is designed with Android system, support dual Sim and dual stand-by. Except for the standard communication function, it
More informationFrequently Asked Questions
Frequently Asked Questions Polycom SoundStation2W What is SoundStation2W? SoundStation2W is Polycom s next-generation, wireless conference phone that gives users the freedom to conference anywhere team
More informationSmartLinx U250 Presentation
SmartLinx U250 Presentation What Is? The SmartLinX is a Hardware/Software solution that allows your Cellular Smartphone to make and receive calls over your existing Home or Office landline/voip connection.
More informationFACILITY TELECOMMUNICATIONS MANAGEMENT FOR THE GOVERNMENT EMERGENCY TELECOMMUNICATIONS SERVICE Introduction
FACILITY TELECOMMUNICATIONS MANAGEMENT FOR THE GOVERNMENT EMERGENCY TELECOMMUNICATIONS SERVICE Introduction This document provides telecommunications management information for organizations that use the
More informationExactly the Same, but Different
Exactly the Same, but Different 1 Shayne Champion, CISSP, CISA, GSEC, ABCP Program Manager GO Cyber Security TVA v1.0 Agenda Define Mobile Device Security o o Similarities Differences Things you Should
More informationWireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman
1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers
More informationTAXONOMY OF TELECOM TERMS
TAXONOMY OF TELECOM TERMS Prepared by TUFF Ltd This short taxonomy is designed to describe the various terms used in today s telecommunications industry. It is not intended to be all embracing but to describe
More informationTHE ENTERPRISE MOBILITY POLICY GUIDEBOOK
THE ENTERPRISE MOBILITY POLICY GUIDEBOOK October 2010 Edition 2 About This Guidebook Research from Strategy Analytics shows that over 90% of organizations now have employees using smartphones within their
More informationWI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION
WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION Ingenico is often asked: what are the differences between Bluetooth and Wi-Fi technologies, which is the best one,
More informationBluetooth wireless technology basics
Bluetooth wireless technology basics Abstract... 2 Introduction... 2 How Bluetooth wireless technology works... 3 BWT network topologies... 4 BWT security... 5 Establishing BWT connections... 6 Activating
More informationWWW.SILENTCIRCLE.COM
INTRODUCING THE WORLD S FIRST ENTERPRISE PRIVACY PLATFORM Why Privacy? PRIVACY IS INCREASINGLY UNDER THREAT IN TODAY S MOBILE WORLD Traditional security solutions weren t built for mobile environments
More informationSecurity Considerations for Cellular 3G Modems & 3G Wireless Routers
Security Considerations for Cellular 3G Modems & 3G Wireless Routers Roque Thuo Wireless Engineer Rf Wireless, LLC 1616 S. Stapley Dr. Suite103, Mesa AZ 85204 1 About RfWeL RfWeL, Radio Frequency Wireless
More informationINFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008
INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG What is wireless technology? ITMC TECH TIP ROB COONCE, MARCH 2008 In our world today, this may mean sitting down at a coffee
More informationAIRAVE Frequently Asked Questions
AIRAVE Frequently Asked Questions 2008 Sprint - 1-2008 Sprint. Sprint and the logo are trademarks of Sprint. Other marks are the property of their respective owners. AIRAVE FAQs General 1. What do I need
More informationITL BULLETIN FOR AUGUST 2012
ITL BULLETIN FOR AUGUST 2012 SECURITY OF BLUETOOTH SYSTEMS AND DEVICES: UPDATED GUIDE ISSUED BY THE NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY (NIST) Shirley Radack, Editor Computer Security Division
More informationDeciphering the Safe Harbor on Breach Notification: The Data Encryption Story
Deciphering the Safe Harbor on Breach Notification: The Data Encryption Story Healthcare organizations planning to protect themselves from breach notification should implement data encryption in their
More informationKonftel 300M Quick Reference Guide
Conference phones for every situation Konftel 300M Quick Reference Guide ENGLISH Description The Konftel 300M is a battery-operated wireless conference phone that can be connected to mobile networks (GSM/3G)
More informationLTE, WLAN, BLUETOOTHB
LTE, WLAN, BLUETOOTHB AND Aditya K. Jagannatham FUTURE Indian Institute of Technology Kanpur Commonwealth of Learning Vancouver 4G LTE LTE (Long Term Evolution) is the 4G wireless cellular standard developed
More information1G to 4G. Overview. Presentation By Rajeev Bansal Director(Mobile-1) Telecommunication Engineering Centre
1G to 4G Overview Presentation By Rajeev Bansal Director(Mobile-1) Telecommunication Engineering Centre Mobile Networks differentiated from each other by the word Generation 1G, 2G, 2.5G, 2.75G, 3G milestones
More informationThreat Mitigation for VoIP
Threat Mitigation for VoIP Bogdan Materna, VP Engineering and CTO VoIPshield Systems Third Annual VoIP Security Workshop June 2, 2006 Overview Basics VoIP Security Impact Examples of real vulnerabilities
More information2G vs 3G. CDMA vs GSM DEMYSTIFYING 2G VS 3G CDMA VS GSM
WHITE PAPER 2G vs 3G CDMA vs GSM DEMYSTIFYING 2G VS 3G CDMA VS GSM A Quick History Lesson Back in 1995, the 2G digital wireless network was introduced, replacing the analog network launched in 1983. In
More informationAn Overview of the Cisco Unified Wireless IP Phone 7921G
CHAPTER1 An Overview of the Cisco Unified Wireless IP Phone 7921G The Cisco Unified Wireless IP Phone 7921G provides wireless voice communication over an Internet Protocol (IP) network. Like traditional
More informationTroubleshooting BGAN
Troubleshooting BGAN Version 1.0 22.08.06 This document provides information on troubleshooting the BGAN service. The topics covered include connecting to the terminal, network registration, IP data connection
More informationHOW W I R E L E S S T E C H N O L O G Y WORKS
HOW WORKS OW ORKS WHAT S INSIDE Inside your wireless phone, there is a compact speaker, a microphone, a keyboard, a display screen, and a powerful circuit board with microprocessors that make each phone
More informationBroadTouch Business Communicator
BroadTouch Business Communicator Admin Guide Release 10.0.1 Document Version 1.0 Table of Contents 1 Summary of Changes...1 1.1 Changes for Release 10.0.1 Document Version 1... 1 2 About BroadTouch Business
More informationIntroduction Chapter 1. Uses of Computer Networks
Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks
More information! encor e networks TM
! encor e networks TM Revision B, March 2008 Document Part Number 15953.0001 Copyright 2008 Encore Networks, Inc. All rights reserved. BANDIT Products Wireless Access Guide For BANDIT, BANDIT IP, BANDIT
More informationDevelopment of Wireless Networks
Development of Wireless Networks Cellular Revolution In 1990 mobile phone users populate 11 million. By 2004 the figure will become 1 billion Phones are most obvious sign of the success of wireless technology.
More informationwww.wilsonelectronics.com 1-866-294-1660
Apple iphone In phone mode dial *3001#12345#* then press CALL. The Field Test Screen will appear. The signal bars will now display the signal in a db reading. -51 is full signal, -105 is no signal. When
More information5.1 Overview of Wireless Card Activation and Configuration
encor! enetworks TM Version A.5, January 2013 2013 Encore Networks, Inc. All rights reserved. Activating a Wireless Card in a Cellular Carrier Network Wireless connections use radiofrequencies (RF) through
More informationWireless Cellular Networks: 1G and 2G
Wireless Cellular Networks: 1G and 2G Raj Jain Professor of Computer Science and Engineering Washington University in Saint Louis Saint Louis, MO 63130 Audio/Video recordings of this lecture are available
More informationKT40. Quick Guide Android 4.4.2
KT40 Quick Guide Android 4.4.2 List KT40 SPECIFICATION... 3 1 EXTERNAL STRUCTURE DESCRIPTION... 4 2 HOME SCREEN... 5 2.1 Notification Bar Icons... 6 3 OPERATION INSTRUCTIONS... 7 3.1 Dialing... 7 3.2 Notification
More informationIntroduction to Wireless Communications and Networks
Introduction to Wireless Communications and Networks Tongtong Li Dept. Electrical and Computer Engineering East Lansing, MI 48824 tongli@egr.msu.edu 1 Outline Overview of a Communication System Digital
More informationCTAP Wireless Equipment Distribution Program Factsheet
CTAP Wireless Equipment Distribution Program Factsheet The purpose of this factsheet is to provide CTAP customers with information about cell phones offered by CTAP, service plans, and wireless industry
More informationBuilding the Mobility Security Eco System in the Cloud for Universal Communications Fact Sheet.
Building the Mobility Security Eco System in the Cloud for Universal Communications Fact Sheet. [Type text] You ve probably heard about the Bring Your Own Device (BYOD) schemes that allow employees to
More informationMobile network security report: Poland
Mobile network security report: Poland GSM Map Project gsmmap@srlabs.de Security Research Labs, Berlin February 2015 Abstract. Mobile networks differ widely in their protection capabilities against common
More informationChapter 6 Telecommunications, Networks, and Wireless. Computing
Chapter 6 Telecommunications, Networks, and Wireless Computing Essay Questions: 1. Define a hub, switch, and a router. 2. List the challenges associated with managing contemporary telecommunications and
More informationContents. New features. Getting started. Entertainment. Transferring data. Managing your phone. Tools
User Guide Contents New features 1 Read before use 1 Unlocking with fingerprint 3 Safe 3 All focus mode 4 Taking photos from the timeline album screen 5 Scanning a QR code 6 Protecting your privacy Getting
More informationVOICE OVER IP VIEWPOINT 01/2006
VOICE OVER IP VIEWPOINT 01/2006 17 JANUARY 2006 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor organisation to the Centre for the
More informationDell Business Phone for Android
Dell Powered by Vonage Business Solutions Table of Contents Overview... 1 Capabilities... 1 Features... 1 Initial Setup... 2 Network Connections... 2 Provisioning... 3 Application Settings After Provisioning...
More informationTechnical Manual. (TLT-2H GPS/GSM Vehicle Tracker) V1.5
Technical Manual (TLT-2H GPS/GSM Vehicle Tracker) V1.5 Product main features Real-time SMS query coordinates time position, Phone Position active help feature speed alarm function historical data uploading
More informationMobile and Sensor Systems
Mobile and Sensor Systems Lecture 1: Introduction to Mobile Systems Dr Cecilia Mascolo About Me In this course The course will include aspects related to general understanding of Mobile and ubiquitous
More informationApplication of IEEE 802.15 to Distribute Cell Phone Calls through a Home Phone Network
Application of IEEE 802.15 to Distribute Cell Phone Calls through a Home Phone Network Student Members: Danny Szczotka Chris Switzer Project Advisor: Dr. Liuqing Yang Graduate Student Advisor: Bo Yu Department
More informationV660. Quick Start Guide. Dual-Mode Phone. Version 1.00 04/2007 Edition 1. Copyright 2007. All rights reserved
V660 Dual-Mode Phone Quick Start Guide Version 1.00 04/2007 Edition 1 Copyright 2007. All rights reserved 1 Overview Your V660 provides standard cellphone functions, and adds WiFi connectivity. In the
More information